New research conducted by the University of Hertfordshire revealed that two-thirds of second-hand Memory card’s still contains the personal data from previous owners
Based on the research, people aren’t sufficiently erasing data from their personal data before selling their old memory cards which are used from mobile phones and tablets.
This In-depth research conducted by the University of Hertfordshire which is commissioned by Comparitech.com, security and privacy reviews website on sold and used memory cards.
Research uncovered that sold memory card into secondhand contains personal information and sensitive materials, including passport copies, contact lists and identification numbers being passed from one person to the next.
A team of researchers purchased around 100 used SD and micro SD memory cards from eBay, secondhand shops and other external sources for the previous 4 months.
All the gathered memory cards ware analyzed using freely available software to recover data and also created a forensic image of each memory card copy.
After the complete analysis researchers were able to recover 65 % memory cards data that contains selfies, contact lists, navigation files, pornography, resumes, browsing history and other more confidential data.
University of Hertfordshir, Cyber Security Professor Andrew Jones,said” This research uncovers the prevalence of second-hand memory cards providing a rich source of sensitive data, that could easily be misused if a buyer so wished. Despite the ongoing media focus on cybercrime and the security of personal data, it is clear from our research that the majority are still not taking adequate steps to remove all data from memory cards before sales.”
Researchers purchased a different type of storage capacity memory cards and complete analyzed it using various ways using publicly available forensic tools.
According to comparitech memory cards were analyzed and given the following result.
These all are the sensitive data eventually used by cyber criminals for various malicious purposes so users avoid selling their used memory cards else make sure the memory card has been completely wiped.
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…
The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…
A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…
Meta has announced the removal of over 2 million accounts connected to malicious activities, including…
Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…
A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…